• Title/Summary/Keyword: Computer Usage

Search Result 1,234, Processing Time 0.027 seconds

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

An Electric Load Forecasting Scheme for University Campus Buildings Using Artificial Neural Network and Support Vector Regression (인공 신경망과 지지 벡터 회귀분석을 이용한 대학 캠퍼스 건물의 전력 사용량 예측 기법)

  • Moon, Jihoon;Jun, Sanghoon;Park, Jinwoong;Choi, Young-Hwan;Hwang, Eenjun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.293-302
    • /
    • 2016
  • Since the electricity is produced and consumed simultaneously, predicting the electric load and securing affordable electric power are necessary for reliable electric power supply. In particular, a university campus is one of the highest power consuming institutions and tends to have a wide variation of electric load depending on time and environment. For these reasons, an accurate electric load forecasting method that can predict power consumption in real-time is required for efficient power supply and management. Even though various influencing factors of power consumption have been discovered for the educational institutions by analyzing power consumption patterns and usage cases, further studies are required for the quantitative prediction of electric load. In this paper, we build an electric load forecasting model by implementing and evaluating various machine learning algorithms. To do that, we consider three building clusters in a campus and collect their power consumption every 15 minutes for more than one year. In the preprocessing, features are represented by considering periodic characteristic of the data and principal component analysis is performed for the features. In order to train the electric load forecasting model, we employ both artificial neural network and support vector machine. We evaluate the prediction performance of each forecasting model by 5-fold cross-validation and compare the prediction result to real electric load.

A Fair Scheduling Model Covering the History-Sensitiveness Spectrum (과거민감도 스펙트럼을 포괄하는 공정 스케줄링 모델)

  • Park, Kyeong-Ho;Hwang, Ho-Young;Lee, Chang-Gun;Min, Sangl-Yul
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.5_6
    • /
    • pp.249-256
    • /
    • 2007
  • GPS(generalized processor sharing) is a fair scheduling scheme that guarantees fair distribution of resources in an instantaneous manner, while virtual clock pursues fairness in the sense of long-term. In this paper, we notice that the degree of memorylessness is the key difference of the two schemes, and propose a unified scheduling model that covers the whole spectrum of history-sensitiveness. In this model, each application's resource right is represented in a value called deposit, which is accumulated at a predefined rate and is consumed for services. The unused deposit, representing non-usage history, gives the application more opportunity to be scheduled, hence relatively enhancing its response time. Decay of the deposit means partial erase of the history and, by adjusting the decaying rate, the degree of history-sensitiveness is controlled. In the spectrum, the memoryless end corresponds GPS and the other end with full history corresponds virtual clock. And there exists a tradeoff between average delay and long-term fairness. We examine the properties of the model by analysis and simulation.

Deriving Priorities of Competences Required for Digital Forensic Experts using AHP (AHP 방법을 활용한 디지털포렌식 전문가 역량의 우선순위 도출)

  • Yun, Haejung;Lee, Seung Yong;Lee, Choong C.
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.1
    • /
    • pp.107-122
    • /
    • 2017
  • Nowadays, digital forensic experts are not only computer experts who restore and find deleted files, but also general experts who posses various capabilities including knowledge about processes/laws, communication skills, and ethics. However, there have been few studies about qualifications or competencies required for digital forensic experts comparing with their importance. Therefore, in this study, AHP questionnaires were distributed to digital forensic experts and analyzed to derive priorities of competencies; the first-tier questions which consisted of knowledge, technology, and attitude, and the second-tier ones which have 20 items. Research findings showed that the most important competency was knowledge, followed by technology and attitude but no significant difference was found. Among 20 items of the second-tier competencies, the most important competency was "digital forensics equipment/tool program utilization skill" and it was followed by "data extraction and imaging skill from storage devices." Attitude such as "judgment," "morality," "communication skill," "concentration" were subsequently followed. The least critical one was "substantial law related to actual cases." Previous studies on training/education for digital forensics experts focused on law, IT knowledge, and usage of analytic tools while attitude-related competencies have not given proper attention. We hope this study can provide helpful implications to design curriculum and qualifying exam to foster digital forensic experts.

A Study on Ocean Meteorological Observation Wave Meter System based on Kalman-Filter (칼만 필터 기반의 스마트 해양기상관측 파고 시스템 연구)

  • Park, Sanghyun;Park, Yongpal;Kim, Heejin;Kim, Jinsul;Park, Jongsu
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1377-1386
    • /
    • 2017
  • We propose a smart ocean meteorological observation system which is capable of real-time measurement of vulnerable marine climate and oceanographic conditions. Besides, imported products have several disadvantages such that they can't be measured for a long time and can't transmit data in real time. In the proposed system, smart ocean observation digging system, it observes real-time ocean weather with data logger methods. Furthermore, we also use existing dataloggers functions with various sensors which are available in the ocean at the same time. Also, we applied the Kalman-filter algorithm to the ocean crest measurement to reduce the noise and increase the accuracy of the real-time wave height measurement. In the experiment, we experimented the proposed system with our proposed algorithms through calibration devices in the real ocean environment. Then we compared the proposed system with and without the algorithms. As a result, the system developed with a lithium iron phosphate battery that can be charged by a system used in the ocean and minimized power consumption by using an RTC based timer for optimal use. Besides, we obtained optimal battery usage and measured values through experiments based on the measurement cycle.

Low-Cost Elliptic Curve Cryptography Processor Based On Multi-Segment Multiplication (멀티 세그먼트 곱셈 기반 저비용 타원곡선 암호 프로세서)

  • LEE Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.8 s.338
    • /
    • pp.15-26
    • /
    • 2005
  • In this paper, we propose an efficient $GF(2^m)$ multi-segment multiplier architecture and study its application to elliptic curve cryptography processors. The multi-segment based ECC datapath has a very small combinational multiplier to compute partial products, most of its internal data buses are word-sized, and it has only a single m bit multiplexer and a single m bit register. Hence, the resource requirements of the proposed ECC datapath can be minimized as the segment number increases and word-size is decreased. Hence, as compared to the ECC processor based on digit-serial multiplication, the proposed ECC datapath is more efficient in resource usage. The resource requirement of ECC Processor implementation depends not only on the number of basic hardware components but also on the complexity of interconnection among them. To show the realistic area efficiency of proposed ECC processors, we implemented both the ECC processors based on the proposed multi-segment multiplication and digit serial multiplication and compared their FPGA resource usages. The experimental results show that the Proposed multi-segment multiplication method allows to implement ECC coprocessors, requiring about half of FPGA resources as compared to digit serial multiplication.

Dynamic NAND Operation Scheduling for Flash Storage Controller Systems (플래시 저장장치 컨트롤러 시스템을 위한 동적 낸드 오퍼레이션 스케줄링)

  • Jeong, Jaehyeong;Song, Yong Ho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.188-198
    • /
    • 2013
  • In order to increase its performance, NAND flash memory-based storage is composed of data buses that are shared by a number of flash memories and uses a parallel technique that can carry out multiple flash memory operations simultaneously. Since the storage performance is strongly influenced by the performance of each data bus, it is important to improve the utilization of the bus by ensuring effective scheduling of operations by the storage controller. However, this is difficult because of dynamic changes in buses due to the unique characteristics of each operation with different timing, cost, and usage by each bus. Furthermore, the scheduling technique for increasing bus utilization may cause unanticipated operation delay and wastage of storage resource. In this study, we suggest various dynamic operation scheduling techniques that consider data bus performance and storage resource efficiency. The proposed techniques divide each operation into three different stages and schedule each stage depending on the characteristics of the operation and the dynamic status of the data bus. We applied the suggested techniques to the controller and verified them on the FPGA platform, and found that program operation decreased by 1.9% in comparison to that achieved by a static scheduling technique, and bus utilization and throughput was approximately 4-7% and 4-19% higher, respectively.

Hangul Porting and Display Performance Comparison of an Embedded System (임베디드 시스템을 위한 한글 포팅 및 출력 성능 비교)

  • Oh, Sam-Kweon;Park, Geun-Duk;Kim, Byoung-Kuk
    • Journal of Digital Contents Society
    • /
    • v.10 no.4
    • /
    • pp.493-499
    • /
    • 2009
  • Three methods frequently used for Hangul display in computer systems are Standard Johab Code in which each of Hangul consonants and vowels is given a 5-bit code and each syllable created by combining them forms a 2-byte code, Standard Wansung Code in which each of all the syllables generally used for Hangul presentation forms a 2-byte code, and Unicode in which each syllable in most of the world's language systems is given a unique code so that it allows computers to consistently represent and manipulate them in a unified manner. An embedded system in general has a lower processing power and a limited amount of storage space, compared to a personal compute(PC) system. According to its usage, however, the former may have a processing power equal to that of the latter. Hence, when Hangul display needs to be adopted, an embedded system must choose a display method suitable for its own resource environment. This paper introduces a TFT LCD initialization method and pixel display functions of an LN2440SBC embedded board on which an LP35, a 3.5" TFT LCD kit, is attached. Using the initialization and pixel display functions, in addition, we compare three aforementioned Hangul display methods, in terms of their processing speeds and amounts of memory space required. According to experiments, Standard Johab Code requires less amount of memory space but more processing time than Standard Wansung Code, and Unicode requires the largest amount of memory space but the least processing time.

  • PDF

Exploring the Intention to Use of Virtual Reality-Based Cognitive Training System for the Elderly Residing in Community Based on Extended Technology Acceptance Model (확장된 기술수용모델을 활용한 지역사회노인의 가상현실 기반 인지훈련시스템 사용의도 탐색)

  • Choi, Moon-Jong;Choi, Jae-Sung;Choun, Seung-Ho;Ha, Yeongmi;Yang, Seung-Kyoung
    • Journal of Digital Convergence
    • /
    • v.18 no.5
    • /
    • pp.347-356
    • /
    • 2020
  • The purpose of this study was to identify the intention to use of virtual reality-based cognitive training system for the elderly residing in community based on extended technology acceptance model. The data were collected 100 elderly residing in community from January 2 to January 31, 2020. As a result, the influence the intent to use a virtual reality-based cognitive training system for the elderly is social influence, perceived usefulness, perceived enjoyment, age. The explaining 54.4% of the variance, it is considered that technology development these factors will be necessary for elderly in the community to promote the intent to use of virtual reality-based cognitive training systems. This study is meaningful in that it has identified the degree of intent to use and influencing factors of virtual reality devices for the elderly in the community. This study could be used as basic data for the development of technologies for virtual reality-based cognitive training systems in the future.

The Design and Implementation to Teach Sampling Distributions with the Statistical Inferences (통계적 추론에서의 표집분포 개념 지도를 위한 시뮬레이션 소프트웨어 설계 및 구현)

  • Lee, Young-Ha;Lee, Eun-Ho
    • School Mathematics
    • /
    • v.12 no.3
    • /
    • pp.273-299
    • /
    • 2010
  • The purpose of the study is designing and implementing 'Sampling Distributions Simulation' to help students to understand concepts of sampling distributions. This computer simulation is developed to help students understand sampling distributions more easily. 'Sampling Distributions Simulation' consists of 4 sessions. 'The first session - Confidence level and confidence intervals - includes checking if the intended confidence level is actually achieved by the real relative frequency for the obtained sample confidence intervals containing population mean. This will give the students clearer idea about confidence level and confidence intervals in addition to the role of sampling distribution of the sample means among those. 'The second session - Sampling Distributions - helps understand sampling distribution of the sample means, through the simulation method to make comparison between the histogram of sampling distributions and that of the population. The third session - The Central Limit Theorem - includes calculating the means of the samples taken from a population which follows a uniform distribution or follows a Bernoulli distribution and then making the histograms of those means. This will provides comprehension of the central limit theorem, which mentions about the sampling distribution of the sample means when the sample size is very large. The forth session - the normal approximation to the binomial distribution - helps understand the normal approximation to the binomial distribution as an alternative version of central limit theorem. With the practical usage of the shareware 'Sampling Distributions Simulation', we expect students to have a new vision on the sampling distribution and to get more emphasis on it. With the sound understandings on the sampling distributions, more accurate and profound statistical inferences are expected. And the role of the sampling distribution in the inferences should be more deeply appreciated.

  • PDF